From: Pubkeybreaker on
Noone told him about domestic ECHELON, or how powerful keyword monitoring is.


******************************************************************************


War #4 - Terrorism
--- -- ---------

Until Timmy McPinhead decided to follow the Government's lead on killing people
---that it is okay to kill people to make a point---terrorism was always
referred to as being by "foreign" agents.

After the explosion, President Clinton called for FBI agents to be able to
tap phones at will, as they can do now for organized crime. In other words,
not only was there the OKC bombing terroristic act, the Government freedom
terrorists then demanded even greater Police State powers over all of us.

Internet signature in alt.activism.militia...

In 1794, James Madison pointed out "the old trick of turning every
contingency into a resource for accumulating force in the government."

----

I don't know any terrorists or foreign agents.

But the government seems to know plenty of people who are terrorists.

: The New York Times, 2/10/87
: "Is This America?", by Anthony Lewis
:
: She is 22 ye


From: Pubkeybreaker on
our government using
them ruthlessly: without letting us vote on it.

Never before could someone walk up to you and number you by scanning
your fingerprints. A number that is yours and yours alone.

You have been numbered for all time.

No ID card needed once portable fingerprint scanners are deployed all over!

If the government suddenly ordered all citizens to be numbered with an
indelible invisible ink on their arms so they were permanently numbered;
so law enforcement could scan them at will: there would be a revolt.

Yet that is what is happening.

Fingerprints, scanned into a computer, are a number.

The number is inescapably yours.

Modern technology means they don't have to put the number on you, they can
read it off of you by minutely examining your body.

And: it is the NSA driving the fingerprint-rollout of the national ID card.

# "The Body As Password", By Ann Davis, Wired Magazine, July 1997
#
# Currently housed at the National Security Agency, a working group of
# federal bureaucrats founded the Biometric Consortium in the early 1990s.
# Its 1995 charter promises to "promote the science and performance of
# biometrics for the government."
#
# Consortium mumbers include state welfare agencies, driver's license
# bureaus, the Immigration and Naturalization Service, the Social Security
# Administration, and the Internal Revenue Service.





From: Pubkeybreaker on
finding that Alvarez had
* "structured" his transactions was enough to justify the seizure.
[
We have Federal laws against terminating someone's benefits based solely
(automatically by computer) on "computer matching" hits of possible
ineligibility. But NOTHING to protect us from this nearly IDENTICAL
use of computer data to terminate "benefits".
]
* To the government, the question of whether the money had been legally
* earned or was the product of a nefarious drug sale was of no concern.
*
* Maybe worse than the nebulous structuring provision is a feature of the
* same group of laws that places the burden of proof on the victim. In
* other words, rather than the government having to prove that Alvarez
* had violated the statute before it seized his money, Alvarez had to
* prove that he was innocent of any wrongdoing before he could get it
* back. Further adding to the profound unfairness of the seizure process
* is an incredible provision that anyone who wants to challenge an action,
* who wants his day in court, must file a bond with the government of
* either $5000 or 10 percent of the value of the seized property. Alvarez
* had to borrow the money from his credit cards.
*
* The Assistant U.S. Attorney Jonathon R. Howden, flooded by financial
* statements by Alvarez's defense attorney (who was a retired career
* criminal investigator with the IRS), admitted he would not take the
* case to court. That step took seven months.
*
* However, Howden made an astonishing attempt to keep half of the $88,000
* the government had seized from Alvarez's bank account. Howden offered
* Alvarez two options: settle the matter by agreeing to a 50 percent
* forfeiture, or the money will be returned to the IRS, who might keep
* it. Alvarez's lawyer called his bluff and got the money back after
* a full year had elapsed. Loss of a full year's interest and $5000 in
*


From: Pubkeybreaker on
a copy of a magazine article that listed
> Secret Service codenames for President Reagan (dated 1983), and a
> material that the Secret Service had suspected was C4 explosives but
> which later turned out not to be.
>
> For some reason they feel COMPELLED TO MENTION THIS AT EACH HEARING as
> if C4 had actually been found when in fact the substance was something
> dentists use: DENTURE MOLD (the owner of the house was a dentist).
>
> The Secret Service specifically complained about his affiliation with
> 2600 Magazine (not a secret and not a reason to label someone a criminal).
[
The Secret Service is apparently unaware that 2600 magazine is the
world's preeminent above-ground hacker zine, subscribed to by members
of security departments all over Wall Street (at the least).

It is filled with fascinating information, highly useful for securing
one's systems. Here's a random sample factoid from 2600: although
on-site company switches are commonly programmed to block '900' number
calls, there is a hole in the programming logic that always lets '555'
exchange numbers through. ("Information wants to be free") Companies
that


From: Risto Lankinen on
System, referring to domestic intercity telephone
microwave radio trunks, said in 1975, "Modern computer techniques make
it possible to sort through that traffic and find target conversations
easily."

p126-127: Since the wiretap law barred the Bureau of Narcotics and
Dangerous Drugs from installing a tap on New York City's Grand Central
Station pay phones, bureau head John Ingersoll asked the NSA for help.

Within a few months the spy agency was sorting through all the
conversations it was already acquiring for general intelligence
purposes.

Of course, the technicians were required to acquire, monitor, and
discard a large number of calls made by people with no connection
with the cocaine business in South American cities.

But so pleased was Mr. Ingersoll with the tips he was getting from the
dragnet monitoring that he ultimately persuaded the NSA to monitor
simultaneously nineteen other U.S. communication hubs.

]

* "Project L.U.C.I.D.", continued...
*
* Fort Meade is the hub of an information gathering octopus whose tentacles
* reach out to the four corners of the earth.
*
* The principal means of communicating this info